Ad

CVE-2026-35043

HIGH CVSS 3.1: 7.8 EPSS 0.02%
Updated Apr 10, 2026
Python
Parameter Value
CVSS 7.8 (HIGH)
Affected Versions before 1.4.38
Fixed In 1.4.38
Type CWE-78 (OS Command Injection)
Vendor Python
Public PoC No

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the cloud deployment path in src/bentoml/_internal/cloud/deployment.py was not included in the fix for CVE-2026-33744. Line 1648 interpolates system_packages directly into a shell command using an f-string without any quoting.

The generated script is uploaded to BentoCloud as setup.sh and executed on the cloud build infrastructure during deployment, making this a remote code execution on the CI/CD tier. This vulnerability is fixed in 1.4.38.

Attack Parameters

Attack Vector
Local
Requires local access
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
Required
User action required

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Weakness Type (CWE)

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Bentoml Bentoml
cpe:2.3:a:bentoml:bentoml:*:*:*:*:*:*:*:*
1.4.38